Intro to Computers – Ch 15 (Test) – Flashcards

Unlock all answers in this set

Unlock answers
question
Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product. However, Samuel is also concerned about protecting his personal information. To further protect his privacy, Samuel has decided to ____ from certain companies by instructing those companies to not to share his personal information with third parties.
answer
Opt out
question
IBF Consultants, LLC provides consulting services in privacy and theft deterrence solutions. One of their clients has very sensitive data and they are less concerned about recovering any stolen computer than ensuring that the data located on the computer is not compromised. Which of the following technologies would be useful in this case?
answer
Kill switch hard drives
question
IBF Consultants, LLC provides consulting services in privacy and theft deterrence solutions. Another client owns a large number of expensive electronic devices and would like to be able to recover them in case of theft. IBF advises her to attach ____ to these devices.
answer
Asset tags
question
Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product. However, Samuel is also concerned about protecting his personal information. In order to lessen the chances of his main e-mail address getting spam, he uses a ____ e-mail address when shopping online.
answer
Throw-away
question
Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product. However, Samuel is also concerned about protecting his personal information. Before providing any personal information on a shopping site, Samuel always reads the Web site's _
answer
Privacy policy
question
One software tool that can be used to help increase the chances of a stolen or lost device being recovered is device tracking software. _________________________
answer
True
question
To comply with truth-in-advertising laws, a(n) unsubscribe e-mail address included in an unsolicited e-mail must be a working address. _________________________
answer
True
question
It is illegal to use computer monitoring software on your own computer or on the computers of your employees. _________________________
answer
False
question
____ is the use of video cameras to monitor activities of individuals, such as employees or individuals in public locations, for work-related or crime-prevention purposes.
answer
Video surveillance
question
Most businesses and Web sites that collect personal information have a(n) ____ that discloses how the personal information you provide will be used.
answer
Privacy policy
question
When spam is sent via IM it is called ____.
answer
Spim
question
The data on the ____ USB flash drive shown in the accompanying figure cannot be accessed until the user enters the appropriate PIN.
answer
Encrypted
question
____ refers to companies recording or observing the actions of employees while on the job.
answer
Employee monitoring
question
The term ____ refers to the rights of individuals and companies to control how information about them is collected and used.
answer
Information privacy
question
By ____, you instruct companies you do business with that they cannot share your personal data with third parties.
answer
Opting out
question
____ can be used to secure portable computers, external hard drives, and other portable pieces of hardware to a table or other object.
answer
Cable locks
question
One common way to deal with spam that makes it to your computer is to use a(n) ____.
answer
Email filter
question
A marketing activity that can be considered a privacy risk is ____.
answer
Electronic profiling
question
Creating a ____ means making a duplicate copy of important files so that when a problem occurs, you can restore those files using the copy.
answer
Backup
question
Users who want their desktop computers to remain powered up when the electricity goes off should use a(n) ____, as shown in the accompanying figure.
answer
UPS
question
For online shopping, signing up for free offers, discussion groups, product registration, and other activities that typically lead to junk e-mail, use a disposable or ____.
answer
Throw away email addresses
question
Laptop ____ protect portable computers from scratches and other damage when they are carried in a conventional briefcase or bag.
answer
Sleeves
question
____ is used specifically for the purpose of recording keystrokes or otherwise monitoring someone's computer activity.
answer
Computer monitoring software
question
____ systems encrypt everything stored on the drive (the operating system, application programs, data, temporary files, and so forth) automatically without any user interaction.
answer
FDE
question
To facilitate using a computer lock, nearly all computers today come with a ____—a small opening built into the system unit case designed for computer locks.
answer
Security slot
question
Collecting in-depth information about an individual is known as ____.
answer
Electronic profiling
question
____ programs can be used to detect and remove some types of illegal computer monitoring and spyware software.
answer
Anti-spyware software
question
The ____ implements regulations for unsolicited e-mail messages and lays the groundwork for a federal Do Not E-Mail Registry.
answer
CAN-SPAM act
question
____ are small programs that take care of software-specific problems, or bugs, such as security holes.
answer
Patches
question
____ cameras are increasingly being installed in schools in the United States and other countries to enable administrators to monitor both teacher and student activities.
answer
Video surveillance
question
Our networked society has raised a number of ____ concerns.
answer
Privacy
question
To supplement backup procedures, businesses and other organizations should have a(n) ____.
answer
Disaster recovery plan
question
For monitoring the physical locations of employees, video cameras can be used, but another possibility is the use of ____.
answer
Proximity cards
question
____ are used for marketing purposes, such as sending advertisements that fit each individual's interests or trying to sign people up over the phone for some type of service.
answer
Marketing databases
question
To ____ means to request that you be included in marketing activities or that your information be shared with other companies.
answer
Opt in
question
Although many of us may prefer not to think about it, ____—the complete malfunction of a computer system—and other types of computer-related disasters do happen.
answer
System failure
question
____ devices are designed to withstand much more physical abuse than conventional devices.
answer
Rugged
question
A(n) ____ is an alternate location equipped with the computers, cabling, desks, and other equipment necessary to keep a business's operations going.
answer
Hot site
question
Some electronic tools, such as computer monitoring software and video surveillance equipment, can be used legally by individuals, businesses, and law enforcement agencies.
answer
True
question
To prevent the counterfeiting of U.S. currency, the Treasury Department releases new currency designs every ____.
answer
7 to 10 years
question
Some local governments permit searches for property located in that area, such as displaying the owner's name, address, and a link to additional information including property value and tax information.
answer
True
question
____ refers to the ability of one computing device (a desktop computer, portable computer, or smartphone, for example) on a network (such as the Internet or a mobile phone network) to identify another device on the same network and determine its status.
answer
Presence technology
question
New security risks are revealed all the time. For instance, it was recently discovered that data from some unencrypted smart meters can be accessed from nearly ____ away, enabling would-be burglars to monitor homes to see if they are occupied based on electricity usage within the homes.
answer
1,000 feet
question
Semirugged PCs are designed to withstand drops of three feet or more onto concrete, extreme temperature ranges, wet conditions, and use while being bounced around over rough terrain in a vehicle.
answer
False
question
Phish refers to unsolicited e-mail sent to a large group of individuals at one time.
answer
False
question
The disaster recovery plan is also called a business continuity plan.
answer
True
question
Prevention measures against the counterfeiting of documents—such as checks and identification cards—include using microprinting, watermarks, and other difficult-to-reproduce content. _________________________
answer
True
question
Cookies and spyware are possible privacy risks.
answer
True
question
Often used in conjunction with face recognition technology, public video surveillance systems are used to try to identify known terrorists and other criminals, to identify criminals whose crimes are caught on tape, and to prevent crimes from occurring. _________________________
answer
True
question
System failure can occur because of a hardware problem, software problem, or a computer virus.
answer
True
question
One of the most obvious types of hardware loss is hardware theft. _________________________
answer
True
question
Many privacy advocates object to the use of video surveillance and face recognition technology in public locations.
answer
True
question
In response to the increased occurrence of identity theft, some local governments have removed birth and death information from their available online records.
answer
True
question
Presence backup enables data backups to be made on a continual basis so that data can be recovered from any point in time, even just a few minutes ago, when needed. _________________________
answer
False
question
Spam sent via IM is called sim. _________________________
answer
False
question
Use voltage inverters to protect all of your sensitive electronics, such as televisions and gaming consoles in addition to computers, from electrical fluctuations.
answer
False
question
You can surf anonymously, opt out of some marketing activities, and use filters and other tools to limit your exposure to spam.
answer
True
question
Mobile device protection software can remotely lock down a lost or stolen phone, display a message on the phone containing instructions for returning the device, and/or play a sound to help the owner locate the phone if it is nearby. _________________________
answer
False
question
According to the American Management Association (AMA), the vast majority of all U.S. companies use some type of electronic surveillance with their employees. However, it is uncommon for employers to discipline employees for misuse of e-mail or the Internet at work.
answer
False
question
Computer monitoring programs can keep a log of all computer keystrokes performed on a computer, record the activities taking place, take screen shots of the screen at specified intervals, and more. _________________________
answer
True
question
Hardware theft can take many forms, including individuals making illegal copies of programs to give to friends and businesses installing software on more computers than permitted in the program's end-user license agreement.
answer
False
question
At the present time, opting-out procedures are confusing and time-consuming, and they do not always work well.
answer
True
question
Read a Web site's piracy rules (if they exist) before providing any personal information.
answer
False
question
To provide continuous power to facilities (such as hospitals, nuclear power plants, and business data centers) that cannot afford to be without power for any period of time, generators can be used. _________________________
answer
True
question
Chain locks can be used to secure computers and other hardware. _________________________
answer
False
question
The hard drives of computers that are to be disposed of should be destroyed before they are sold or recycled. _________________________
answer
False
question
A privacy concern is the inclusion of digital camera capabilities in most mobile phones today.
answer
True
question
A(n) head crash occurs when a hard drive's read/write heads actually touch the surface of a hard disk. _________________________
answer
True
question
There are many options for protecting yourself against computer monitoring by your employer or the government.
answer
False
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New